Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 4 additions & 4 deletions src/node/http.ts
Original file line number Diff line number Diff line change
Expand Up @@ -73,7 +73,7 @@ export const authenticated = (req: express.Request): boolean => {
)
case AuthType.Openid:
if (req.oidc.isAuthenticated()) {
logger.debug(`User is authenticated using OpenID Connect\n${req.oidc.user}`)
logger.debug("User authenticated with OpenID Connect", field("user", req.oidc.user))

// Check to see if a group claim was specified.
// If there was no group claim specified the user will be considered authorized.
Expand All @@ -87,21 +87,21 @@ export const authenticated = (req: express.Request): boolean => {
if (key === req.args["openid-group-claim"] && req.args["openid-group-claim"].value) {
for (const value in claims) {
if (req.args["openid-user-group"] === claims[value]) {
logger.debug(`User is authorized!\n${req.oidc.user}`)
logger.debug("User authorized", field("user", req.oidc.user))
return true
}
}
}
}

// Throw an error informing the user that they're unauthorized.
logger.debug(`User is not authorized!\n${req.oidc.user}`)
logger.debug("User not authorized", field("user", req.oidc.user))
throw new HttpError("Unauthorized", HttpCode.Unauthorized)
}

// Returning false means the user isn't authenticated.
// This should trigger a redirect so the user can get authenticated.
logger.debug(`User is not authenticated using OpenID Connect\n${req.oidc.user}`)
logger.debug("User not authenticated using OpenID Connect", field("user", req.oidc.user))
return false

default:
Expand Down